Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Web 2.0 Security - Defending AJAX, RIA, AND SOA
Web 2.0 Security - Defending AJAX, RIA, AND SOA
Service-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup Language (Ajax) comprise the backbone behind now-widespread Web 2.0 applications, such as MySpace, Google Maps, Flickr, and Live.com. Although these robust tools make next-generation Web applications possible, they also add new security...
Google Hacking for Penetration Testers
Google Hacking for Penetration Testers
Google Hacking for Penetration Testers explores the explosive growth of a technique known as "Google Hacking." This simple tool can be bent by hackers and those with malicious intents to find hidden information, break into sites, and access supposedly secure information. Borrowing the techniques pioneered by malicious...
The Ethical Hack: A Framework for Business Value Penetration Testing
The Ethical Hack: A Framework for Business Value Penetration Testing

This book explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. This book is unique in that it goes beyond the technical aspects of penetration testing to address the processes and rules of engagement required...

Information and Communications Technologies OECD Communications Outlook 2007
Information and Communications Technologies OECD Communications Outlook 2007
The OECD Communications Outlook provides an extensive range of indicators for different types of communications networks and compares performance indicators such as revenue, investment, employment and prices for service throughout the OECD area. These indicators are essential for industry and for regulators who use benchmarking to evaluate policy...
Hacking For Dummies
Hacking For Dummies

Updated for Windows 8 and the latest version of Linux

The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully...

Inside Network Security Assessment: Guarding Your IT Infrastructure
Inside Network Security Assessment: Guarding Your IT Infrastructure
As an IT professional, you need to know how to perform network security assessments. Inside Network Security Assessment: Guarding Your IT Infrastructure is a collection of utilities and templates that will take you through the assessment process. Written by two highly qualified authors with close ties to the...
Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA

This book is a concise one-stop desk reference and synopsis of basic knowledge and skills for Cisco certification prep. For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this book lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices....

Renewable Energy (Energy Science and Engineering)
Renewable Energy (Energy Science and Engineering)
The present edition has been updated in a number of renewable energy technology areas (Chapter 4 and 5), where progress have been made over the recent years. New solar simulation studies have been added to Chapter 6, and market considerations have been included in the overview in Chapter 1, and in discussing industry liberalisation in Chapter 7....
Developing More-Secure Microsoft  ASP.NET 2.0 Applications (Pro Developer)
Developing More-Secure Microsoft ASP.NET 2.0 Applications (Pro Developer)
Get hands-on, expert guidance for developing more secure Web applications with ASP.NET 2.0 with this in-depth reference. The nature of the Web and its underlying communication protocols make Web applications harder to secure and, therefore, primary targets for hacking attacks and other kinds of compromises. This book guides you through the possible...
Worldwide Wi-Fi: Technological Trends and Business Strategies
Worldwide Wi-Fi: Technological Trends and Business Strategies

Your success guide to the next wireless revolution

The next watershed innovation in wireless technology is here: IEEE 802.11 wireless local area networks (LANs).

Recent studies from IDC indicate that the Wi-Fi wireless LAN market will likely account for ninety percent of projected LAN equipment revenues by...

CCNA Exam Cram (Exam 640-802) (3rd Edition)
CCNA Exam Cram (Exam 640-802) (3rd Edition)
“The CCNA exam is difficult and I would not have passed it if I did not have this book with me. The CCNA Exam Cram is an indispensable resource that guided me from the introduction of networking fundamentals to the application of networking theories. Whether you need to learn from scratch or just need a quick reference, this book is an...
Security+ Guide to Network Security Fundamentals
Security+ Guide to Network Security Fundamentals

Reflecting the latest developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals, 4e provides the most current coverage available while thoroughly preparing readers for the CompTIA Security+ SY0-301 certification exam. Its comprehensive introduction to practical network and computer...

unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy